[152354] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Operation Ghost Click

daemon@ATHENA.MIT.EDU (Leigh Porter)
Thu Apr 26 17:48:45 2012

From: Leigh Porter <leigh.porter@ukbroadband.com>
To: Andrew Latham <lathama@gmail.com>
Date: Thu, 26 Apr 2012 21:50:24 +0000
In-Reply-To: <CA+qj4S_My6SMjpgKo0jur962=TCsf94tZBsRGDPCo+ky0SgtuQ@mail.gmail.com>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On 26 Apr 2012, at 22:47, "Andrew Latham" <lathama@gmail.com<mailto:latham=
a@gmail.com>> wrote:

On Thu, Apr 26, 2012 at 5:38 PM, Jeroen van Aart <jeroen@mompl.net<mailto:=
jeroen@mompl.net>> wrote:

Yes its a major problem for the users unknowingly infected.  To them
it will look like their Internet connection is down.  Expect ISPs to
field lots of support s

Is there a list of these temporary servers so I can see what customers are=
 using them (indicating infection) and head off a support call with some c=
ontact?

--
Leigh


______________________________________________________________________
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
______________________________________________________________________

home help back first fref pref prev next nref lref last post